Security
How to avoid data breaches while accelerating your digital transformation
Author: Chris Hockings, Chief Technology Officer (Cyber Security), IBM Australia and New Zealand As the pandemic accelerated your need for digital transformation, you needed to act. And fast. And you were not alone. But new findings from the recent IBM-Ponemon Institute Cost of a Data Breach Report 2021 suggest that an organisation’s pace of change […]
This type of data breach will cost you more time and money
Author: Chris Hockings, Chief Technology Officer (Cyber Security), IBM Australia and New Zealand Cybercriminals can fly under the radar, making one type of breach harder to detect and more costly than others. Credential-related breaches take 250 days to discover, on average, and another 91 days to contain, according to the global IBM-Ponemon Institute Cost of […]
How to avoid data breaches while accelerating your digital transformation
Author: Chris Hockings, Chief Technology Officer (Cyber Security), IBM Australia and New Zealand As the pandemic accelerated your need for digital transformation, you needed to act. And fast. And you were not alone. But new findings from the recent IBM-Ponemon Institute Cost of a Data Breach Report 2021 suggest that an organisation’s pace of change […]
X-Force Threat Intelligence Index
Author: Stephen Burmester, Asia Pacific Leader, X-Force Incident Response Extraordinary circumstances defined 2020, from a global pandemic and economic turmoil to social and political unrest. Against this backdrop, cyber adversaries sought to exploit the necessities of communication networks, target supply chains and critical infrastructure, and reap profits by doubling down on ransomware, data theft and […]
Identity theft: a personal and organisational threat
Author: John Martin, Senior Security Architect, IBM New Zealand Identity theft is a growing phenomenon, affecting as many as 133,000 New Zealanders annually at a cost to the economy of as much as $209 million every year1. Typically, identity theft is used to perform financial transactions using accounts in another person’s name. These can be […]
Getting ready for the New Zealand Privacy Act 2020
Author: John Martin, Senior Security Architect, IBM Cloud and Cognitive Software, New Zealand Are you ready for the New Zealand Privacy Act 2020 to come into effect on 1st December 2020? There’s a lot to consider as the clock ticks down and your organisation’s ability to comply is critical if you want to avoid some […]
How hackers are exploiting COVID-19
Remote working coupled with uncertainty around coronavirus gives hackers leverage into critical data. The Morrison government’s $1.34b investment in bolstering the country’s cybersecurity defences should be taken as a wake-up call to corporate Australia, according to industry experts. While COVID-19 has been a cause for pause for much of the world, for sophisticated cybercriminals it […]
The rising cost of a data breach in 2020
By Stephen Burmester, Asia Pacific Lead – X-Force Incident Response and Intelligence Services (IRIS) Increased remote working and digital footprints have accelerated the importance of cybersecurity in today’s business world. While the cost and risk of a cybersecurity breach are increasing year-on-year, there are measures companies can take to minimise the threat. Although breaches remain […]
Collaborative Threat Defence with IBM and Cisco
Author: Ali Daher, IBM Security Leader A/NZ When it comes to threat defence, it’s a cluttered market out there! There are multiple security vendors and a multitude of tools to solve different security requirements. Common feedback we hear from customers is, wouldn’t it be great to: Reduce product and vendor complexity Streamline workflows between security […]
Cybersecurity: How to stay safe online during COVID-19
The big shift to remote working has meant huge changes in how we do our jobs, including risks we didn’t need to worry about before. COVID-19 isn’t the only pandemic we’re suffering right now. Our digital lives are under unprecedented attack and the very thing that is meant to keep us safe from the actual […]
The need for gender diversity in cybersecurity is real
Author: Pelin Nancarrow, Consulting & System Integration Leader A/NZ I have been helping clients establish guidelines for implementing, maintaining and improving information security management in their organisations for 17 years. Although it has improved, I am often still the only woman in the room. It is now more critical than ever for organizations to attract and retain […]
The value of psychology and cognitive science in Cybersecurity
Author: Fiona Byrnes, AP Managed Security Services Delivery Executive, IBM Security Who is today’s cybercriminal? What new data can be commoditised or code weaponised for disruption? These are common security intelligence questions asked in our client conversations. While these questions are about the preventative tools, testing, analytics, and security methodology, they also have underlining psychology. […]